Scanning 2D barcodes, finding free Wi-Fi access points, sending SMS messages, listening to music, and watching MP4 videos: these are very common activities that we do using our smartphones.
Can you imagine that simply doing these things can get your smarphones infected with "worms" that can not only steal personal information from your phone, but also infect your friends's phones.
Sound scary? It will not be long before worms like this spread among smartphones. What makes the attacks feasible is an emerging technology called HTML5-based app development, and it has been rapidly gaining popularity in the mobile industry.
When the adoption of this technology reaches certain threshold, attacks like this will become quite common, unless we do something to stop it. A recent Gartner report says that by 2016, fifty percent of the mobile apps will be using HTML5-based technologies.
All major mobile systems will be affected, including Android, iOS, Blackberry, Windows Phone, etc., because they all support HTML5-based mobile apps.
A notorious problem of the HTML5-based technology is that malicious code can be easily injected into the program and get executed. That is why the Cross-Site Scripting (XSS) attack is still one of the most common attacks in the Web.
XSS attacks can only target at web applications through a single channel (i.e. the Internet), but with the adoption of the same technology in mobile devices, we have found out that a similar type of attack can not only be launched against mobile apps, it can attack from many channels, including 2D barcode, Wi-Fi scanning, Bluetooth pairing, MP3 songs, MP4 videos, SMS messages, NFC tags, Contact list, etc. As long as an HTML5-based app displays information obtained from outside or from anohter app, it may be a potential victim.
Chris Hittinger | EurekAlert!
Miniscule Mirrored Cavities Connect Quantum Memories
24.06.2015 | Department of Energy, Office of Science
SASER-Siegfried – Record-breaking Transmission Field Trial
24.06.2015 | EURESCOM European institute for research and strategic studies in telecommunications
Wind turbines could be installed under some of the biggest bridges on the road network to produce electricity. So it is confirmed by calculations carried out by a European researchers team, that have taken a viaduct in the Canary Islands as a reference. This concept could be applied in heavily built-up territories or natural areas with new constructions limitations.
The Juncal Viaduct, in Gran Canaria, has served as a reference for Spanish and British researchers to verify that the wind blowing between the pillars on this...
New technique combines electron microscopy and synchrotron X-rays to track chemical reactions under real operating conditions
A new technique pioneered at the U.S. Department of Energy's Brookhaven National Laboratory reveals atomic-scale changes during catalytic reactions in real...
Think of an object made of iron: An I-beam, a car frame, a nail. Now imagine that half of the iron in that object owes its existence to bacteria living two and a half billion years ago.
Think of an object made of iron: An I-beam, a car frame, a nail. Now imagine that half of the iron in that object owes its existence to bacteria living two and...
A team of scientists including PhD student Friedrich Schuler from the Laboratory of MEMS Applications at the Department of Microsystems Engineering (IMTEK) of...
The three-year clinical trial results of the retinal implant popularly known as the "bionic eye," have proven the long-term efficacy, safety and reliability of...
25.06.2015 | Event News
16.06.2015 | Event News
11.06.2015 | Event News
03.07.2015 | Press release
03.07.2015 | Agricultural and Forestry Science
03.07.2015 | Health and Medicine